Lines Matching full:ciphers
98 /* Supported ciphers. */
305 } ciphers[CURL_GSKPROTO_LAST];
320 memset((char *) ciphers, 0, sizeof ciphers);
322 ciphers[i].buf = malloc(l);
323 if(!ciphers[i].buf) {
325 free(ciphers[i].buf);
328 ciphers[i].ptr = ciphers[i].buf;
329 *ciphers[i].ptr = '\0';
354 strcpy(ciphers[i].ptr, ctp->gsktoken);
355 ciphers[i].ptr += strlen(ctp->gsktoken);
367 if(!(*protoflags & (1 << i)) || !ciphers[i].buf[0]) {
369 ciphers[i].buf[0] = '\0';
373 /* Try to set-up TLSv1.1 and TLSv2.1 ciphers. */
376 ciphers[CURL_GSKPROTO_TLSV11].buf, TRUE);
380 failf(data, "TLSv1.1-only ciphers are not yet supported");
387 ciphers[CURL_GSKPROTO_TLSV12].buf, TRUE);
391 failf(data, "TLSv1.2-only ciphers are not yet supported");
397 /* Try to set-up TLSv1.0 ciphers. If not successful, concatenate them to
398 the SSLv3 ciphers. OS/400 prior to version 7.1 will understand it. */
401 ciphers[CURL_GSKPROTO_TLSV10].buf, TRUE);
404 strcpy(ciphers[CURL_GSKPROTO_SSLV3].ptr,
405 ciphers[CURL_GSKPROTO_TLSV10].ptr);
409 /* Set-up other ciphers. */
412 ciphers[CURL_GSKPROTO_SSLV3].buf, FALSE);
415 ciphers[CURL_GSKPROTO_SSLV2].buf, FALSE);
419 free(ciphers[i].buf);